Dynamic spectrum utilization in ad hoc networks

Violet Syrotiuk, M. Cui, S. Ramkumar, Charles Colbourn

Research output: Contribution to journalArticle

10 Citations (Scopus)

Abstract

This paper considers the problem of adaptively utilizing temporal and spatial "holes" in spectrum for communications. In addition to improving spectrum utilization, it also enables the rapid deployment of military assets into remote areas where the spectrum assignment may differ. The problem raises issues related to modelling available spectrum, link establishment, and methods to employ the holes. In a tactical environment, evading interception and detection is critical; hence coding and steganographic techniques are applied. A simulation study investigates trade-offs between an automatic repeat request (ARQ) scheme and a scheme employing erasure codes in predicted holes for high packet loss rates.

Original languageEnglish (US)
Pages (from-to)665-678
Number of pages14
JournalComputer Networks
Volume46
Issue number5
DOIs
StatePublished - Dec 5 2004

Fingerprint

Packet loss
Ad hoc networks
Communication

Keywords

  • Digital battlefield
  • Mobile ad hoc networks
  • Spectrum utilization

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Dynamic spectrum utilization in ad hoc networks. / Syrotiuk, Violet; Cui, M.; Ramkumar, S.; Colbourn, Charles.

In: Computer Networks, Vol. 46, No. 5, 05.12.2004, p. 665-678.

Research output: Contribution to journalArticle

Syrotiuk, Violet ; Cui, M. ; Ramkumar, S. ; Colbourn, Charles. / Dynamic spectrum utilization in ad hoc networks. In: Computer Networks. 2004 ; Vol. 46, No. 5. pp. 665-678.
@article{68661211e91649f38f978761b92ac4c9,
title = "Dynamic spectrum utilization in ad hoc networks",
abstract = "This paper considers the problem of adaptively utilizing temporal and spatial {"}holes{"} in spectrum for communications. In addition to improving spectrum utilization, it also enables the rapid deployment of military assets into remote areas where the spectrum assignment may differ. The problem raises issues related to modelling available spectrum, link establishment, and methods to employ the holes. In a tactical environment, evading interception and detection is critical; hence coding and steganographic techniques are applied. A simulation study investigates trade-offs between an automatic repeat request (ARQ) scheme and a scheme employing erasure codes in predicted holes for high packet loss rates.",
keywords = "Digital battlefield, Mobile ad hoc networks, Spectrum utilization",
author = "Violet Syrotiuk and M. Cui and S. Ramkumar and Charles Colbourn",
year = "2004",
month = "12",
day = "5",
doi = "10.1016/j.comnet.2004.06.021",
language = "English (US)",
volume = "46",
pages = "665--678",
journal = "Computer Networks",
issn = "1389-1286",
publisher = "Elsevier",
number = "5",

}

TY - JOUR

T1 - Dynamic spectrum utilization in ad hoc networks

AU - Syrotiuk, Violet

AU - Cui, M.

AU - Ramkumar, S.

AU - Colbourn, Charles

PY - 2004/12/5

Y1 - 2004/12/5

N2 - This paper considers the problem of adaptively utilizing temporal and spatial "holes" in spectrum for communications. In addition to improving spectrum utilization, it also enables the rapid deployment of military assets into remote areas where the spectrum assignment may differ. The problem raises issues related to modelling available spectrum, link establishment, and methods to employ the holes. In a tactical environment, evading interception and detection is critical; hence coding and steganographic techniques are applied. A simulation study investigates trade-offs between an automatic repeat request (ARQ) scheme and a scheme employing erasure codes in predicted holes for high packet loss rates.

AB - This paper considers the problem of adaptively utilizing temporal and spatial "holes" in spectrum for communications. In addition to improving spectrum utilization, it also enables the rapid deployment of military assets into remote areas where the spectrum assignment may differ. The problem raises issues related to modelling available spectrum, link establishment, and methods to employ the holes. In a tactical environment, evading interception and detection is critical; hence coding and steganographic techniques are applied. A simulation study investigates trade-offs between an automatic repeat request (ARQ) scheme and a scheme employing erasure codes in predicted holes for high packet loss rates.

KW - Digital battlefield

KW - Mobile ad hoc networks

KW - Spectrum utilization

UR - http://www.scopus.com/inward/record.url?scp=6444231103&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=6444231103&partnerID=8YFLogxK

U2 - 10.1016/j.comnet.2004.06.021

DO - 10.1016/j.comnet.2004.06.021

M3 - Article

AN - SCOPUS:6444231103

VL - 46

SP - 665

EP - 678

JO - Computer Networks

JF - Computer Networks

SN - 1389-1286

IS - 5

ER -